NCTI-FTTX BASICS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many channels are available with IEEE 802.11g?

11

Which one of the following Institute of Electrical and Electronics Engineers (IEEE) wireless standards utilizes the 5 gigahertz (GHz) frequency band for its signal transmissions?

802.11n

Why have 900 megahertz (MHz) Industrial, Scientific, and Medical (ISM) band wireless local area networks (WLAN) lost favor in comparison to 2.4 gigahertz (GHz) and 5 GHz frequency systems?

900 MHz devices are more expensive and provide slower data throughput.

What device would a wireless local area network (WLAN) administrator install between the access point (AP) or bridge and the network to give indoor local area network (LAN) users as much bandwidth as possible?

A bandwidth control unit (BCU).

What test should be performed during the site survey to enable the design engineer to understand and control what the user's experience will be on the wireless local area network (WLAN)?

A data throughput test.

Why would a wireless local area network (WLAN) administrator rarely see the "authenticated" step on the access point (AP)?

Because clients pass the authentication stage and immediately proceed into the association stage.

How does spread spectrum technology reduce the probability of signal jamming?

By transmitting over a wide frequency spectrum.

What security service in an enterprise wireless gateway enables the wireless network administrator to assign levels of service to a particular user?

Class of service (CoS).

What unit of measurement is used to express the gain of an antenna?

Decibels isotropic (dBi).

In a segmented wireless local area network (WLAN) that has a different Internet protocol (IP) address for each segment, which solution allows mobile clients to maintain their connectivity when roaming into different segments?

Deploying all access points (AP) on a single virtual local area network (VLAN) using a flat IP subnet for all APs so that no change of IP address for roaming clients occurs and all traffic goes through a central controller.

As a general rule, how does an increase in effective isotropic radiated power (EIRP) relate to the link budget range?

Each 6 decibels (dB) increase in EIRP equates to a doubling of range.

Which of the following describes a fiber pigtail?

Fiber-optic cable with pre-connectorized ends.

Operation as an Institute of Electrical and Electronics Engineers (IEEE) 802.11ac device occurs only in the 5 gigahertz (GHz) Unlicensed National Information Infrastructure (U-NII) radio band, so how are 802.11ac devices able to maintain compatibility with earlier standards that operate in the 2.4 GHz Industrial, Scientific, and Medical (ISM) radio bands?

IEEE 802.11ac devices also operate in the 2.4 GHz ISM range.

In what manner do radio waves propagate (move) away from the source (antenna)?

In a straight line in all directions at once.

How are optical splitters used in the forward path?

In the forward path, optical splitters are used as passive branching devices that divide an optical signal across multiple output fibers.

Which term describes the operation mode of a basic service set (BSS)?

Infrastructure mode.

Which mode uses a wireless access point (WAP) connected to a wired network?

Infrastructure.

What is the purpose of the distributed coordination function (DCF) in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN)?

It allows all clients on a WLAN to contend for access on the shared radio frequency (RF) transmission medium using the carrier sense multiple access with collision avoidance (CSMA/CA) protocol.

Which statement describes a passive injector?

It places direct current (DC) voltage onto a CAT-5e cable.

What layers of the Open Systems Interconnection (OSI) reference model are specific to cable networks and are present only between Data Over Cable Service Interface Specification (DOCSIS) modems and the cable modem termination system (CMTS)?

Layers 1 through 4 (Physical layer, Data Link Layer, Network Layer, and Transport Layer) are applied between the DOCSIS modem and CMTS.

Which element of a passive optical network (PON) uses a Bragg grating filter?

Optical distribution network (ODN)

Which one of the following radio frequency (RF) behaviors is defined as "the bending of a wave as it passes through a medium of different density"?

Refraction.

What should be checked as a possible cause of hum on a customer's telephone line?

Shielding problems in the station wiring, poor terminations, or poor grounding and bonding.

Which type of interframe space provides the highest level of priority network function control over the medium for a short time period?

Short Interframe Space (SIFS).

Which step in the troubleshooting process requires a discussion with the customer to gather more detail about the problem?

Step 1: Identify the problem.

To prevent hacker access to passwords and Internet protocol (IP) addresses, why would you want to place wireless access points (AP) on switches instead of hubs?

Switches prevent the broadcast of packets to all network segments.

What are some common methods used to configure and manage access points (AP)?

Telnet/ssh (secure shell), universal serial bus (USB), and a built-in web server for browser access.

Access points (AP) must support what encryption techniques in order to comply with Institute of Electrical and Electronics Engineers (IEEE) 802.11i security standards?

Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and AES-CCMP (Counter-Mode/CBC-MAC Protocol).

Which Data over Cable Service Interface Specification (DOCSIS) layer is used by the cable modem termination system (CMTS) to differentiate between cable modems?

The DOCSIS Media Access Control (MAC) Layer.

Why is shared key authentication considered a security risk in a wireless local area network (WLAN)?

The access point (AP) transmits the challenge text in the clear and receives the same challenge text encrypted with the wired equivalent privacy (WEP) key.

What should you note in the wireless local area network (WLAN) site survey if a semidirectional antenna is required for adequate coverage?

The antenna orientation along with the antenna's side and back lobes for coverage and security reasons.

Why has it become cost-effective for enterprise companies to integrate wireless local area network (LAN) segments into their networks?

The cost of wireless technology has decreased and the quality has increased.

How are interframe spaces used in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN)?

They are used to defer a station's access to the medium and provide various levels of priority.

In regard to Wi-Fi networks, what is WPS used for?

To enable connection to a Wi-Fi network without a Windows interface.

What are the three main conditions that influence the range of a wireless local area network (WLAN)?

Transmission power, antenna type and location, and environment.

How might you confirm the presence of a hidden node on the network?

Turn on the request to send/clear to send (RTS/CTS) protocol and watch for increased network data throughput.

How should the digital multimeter (DMM) be used to troubleshoot problems in the telephone wiring?

Use the voltmeter function; both the network interface device (NID) and the embedded multimedia terminal adapter (EMTA) provide a steady on-hook voltage.

What are some desired features of an access point (AP) used to perform wireless local area network (WLAN) site surveys?

Variable output power and external antenna connectors.

After resolving the problem with the premises wiring issue, which of the following is the next step in the six-step process that the technician should take?

Verify that the problem has been resolved and that phone service is running perfectly on all phones.

Which encryption method is the most secure for a wireless network?

WPA2.

What is the most basic question you should ask a customer before visiting the customer's facility to perform a site survey?

What kind of facility is it? What is your budget? How many TV sets are there? How old are the computers that connect to the network?

Which of the following networks or products use spread spectrum technologies?

Wireless local area networks (LAN), Bluetooth, and global positioning systems (GPS).

What is it called when several computers are sharing files without a WAP?

ad-hoc mode.

What does a basic service set (BSS) consist of?

A BSS consists of one access point (AP) and one or more wireless clients.

What is the typical coverage pattern of a semidirectional antenna?

A hemispherical or cylindrical pattern.

Ideally, what should the next step be after you complete the wireless local area network (WLAN) site survey and provide the survey results in a report to the customer?

A wireless consulting firm should be given the site survey report so that it will then be able to provide effective information on equipment purchasing and security solutions.

What is the standard encryption method used with WPA2

AES.

An independent basic service set (IBSS) is also commonly referred to as which one of the following?

Ad hoc network.

What wireless local area network (WLAN) device can be described as a half-duplex device with intelligence equivalent to that of a sophisticated Ethernet switch?

An access point (AP).

Which of these components is used in a passive optical network (PON)?

Optical splitters

How do you troubleshoot a hidden node?

Test for degraded data throughput at all client locations.

When analyzing a problem, what can the technician learn by asking the customer to show or demonstrate the problem?

The symptoms of the problem can be viewed and any unusual screens or customer entries can be identified

When configuring a wireless router, why is changing the service set identifier (SSID) from the device default recommended?

To avoid telling hackers exactly what the device is.

Which of the provided voltage standing wave ratios (VSWR) shown here is best for transferring radio frequency (RF) energy between connections?

1.2:1

What is the maximum range of Class 2, 2.5 milliwatt (mW), Bluetooth devices?

10 meters or 33 feet.

How wide is each of the three wireless local area network (WLAN) Unlicensed National Information Infrastructure (U-NII) bands?

100 megahertz (MHz).

Given an access point (AP) with 100 milliwatts (mW) of output power connected through a cable with 3 decibels (dB) of loss to the antenna with a 10 decibels isotropic (dBi) gain, what is the approximate Equivalent Isotropically Radiated Power (EIRP) level from the antenna in mW?

1000 mW. 100 mW. 500 mW. 250 mW.

The Federal Communications Commission (FCC) rules regarding power output for frequency-hopping spread spectrum (FHSS) state that a maximum output to the intentional radiator (IR) with 5 megahertz (MHz) of carrier frequency bandwidth must be which one of the following?

125 milliwatts (mW).

Which is the largest IEEE 802.11 data frame that can traverse a wireless local area network (WLAN) without fragmentation?

2,346 bytes.

All 802.11 standards use one of two frequency bands. What are these frequency bands?

2.4 GHz and 5 GHz bands.

What is the width of direct sequence spread spectrum (DSSS) channels and how far apart are their center frequencies spaced?

22 MHz and 5 MHz.

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use?

24 bit.

When using a digital signal analyzer to troubleshoot data throughput in the Data Over Cable Service Interface Specification (DOCSIS) network, what is the minimum modulation error ratio (MER) into the cable modem for a 256- quadrature amplitude modulation (QAM) carrier?

32 dB or greater

What is the Federal Communications Commission (FCC) regulation for the maximum equivalent isotropically radiated power (EIRP) from a point-to-multipoint (P2MP) wireless local area network (WLAN) antenna?

4 watts (W).

What does the Institute of Electrical and Electronics Engineers (IEEE) specify as the maximum allowable power output into the intentional radiator for IEEE 802.11a-, 802.11n-, and 802.11ac-compliant devices operating on the lower Unlicensed National Information Infrastructure (U-NII) radio band?

40 milliwatts (mW).

A transmitter outputs 100 milliwatts (mW). An antenna cable connects the transmitter to an amplifier, and the power into the amplifier's input measures 50 mW. The amplifier increases the signal to the original transmitter's power level and sends the signal to the antenna. The antenna receives the signal from the amplifier at 75 mW, and then transmits at 150 mW. What is the intentional radiator's (IR) power level in this radio frequency (RF) circuit?

75 mW. 150 mW. 50 mW. 100 mW.

What would be the downstream throughput if two quadrature amplitude modulation (QAM) channels with a throughput of 38 megabits per second (Mbps) were bonded?

76 Mbps

Which of the following Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN) standards specifies both spread spectrum radio frequency (RF) and infrared (IR) transmission technologies?

802.11

What uses the 2.4-GHz band and runs at 54 Mbps?

802.11g

What power over Ethernet (PoE) device picks off the direct current (DC) voltage that has been injected into the CAT-5e cable by the injector and makes it available to the equipment through the regular DC power jack?

A DC picker or tap.

What type of wireless local area network (WLAN) attack could cost an employee their job because network usage logs point directly to the employee whenever a hacker gains access to the employee's domain login information and causes havoc on the network?

A passive attack.

What antenna type is ideal for making a point-to-point (P2P) network connection between two office buildings that are across the street from one another?

A semidirectional antenna.

What is a man-in-the-middle attack on a wireless local area network (WLAN)?

A situation in which a hacker uses an access point (AP) to effectively hijack mobile nodes (clients) by sending a stronger signal than the legitimate AP is sending.

What test instrument is used to locate and measure interfering narrowband radio frequency (RF) signals in an Institute of Electrical and Electronic Engineers (IEEE) 802.11 wireless local area network (WLAN), among other things?

A spectrum analyzer.

What is a slot time in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN)?

A standard period of time which is preprogrammed into the radio and determined by the WLAN technology being utilized. A standard period of time on a WLAN in which packets are inserted. As with a clock's second hand, there are 60 slots per minute to insert interframe spaces in a WLAN. The interval in which short fragmented packets are spaced when transmitted in a WLAN.

What is a half-duplex device that is only capable of Open Systems Interconnection (OSI) reference model Layer 2 (Data Link Layer) connectivity?

A wireless bridge.

Which statement best describes protocol filtering that has been implemented in a wireless bridge?

Allowing or denying wireless traffic using Open Systems Interconnection (OSI) reference model Layer 4 (Transport Layer) ports to filter Layer 7 (Application Layer) applications.

What is the difference between the fiber-to-the-node (FTTN) and fiber-to-the-curb (FTTC) topologies?

An FTTC is allowed a smaller number of RF amplifiers between the optical fiber and the customer premises.

What is the likely problem when there is dial tone on one phone connected to an outlet, but not on two other phones connected to two different outlets?

An open circuit caused by a break in a conductor, poor contact in a modular connector, or an incorrect wire connection.

What causes co-channel interference in a wireless local area network (WLAN)?

An overlap in the signal ranges of access points (AP) or different WLANs operating on the same channels.

What is the last step of the basic wireless access point (WAP) setup?

Apply security.

In which of the following applications might a wireless local area network (WLAN) be deployed in a distribution layer role?

As a building-to-building bridge used to link corporate network segments.

Heat shrink tubing is installed over the fusion-splice to strengthen and protect it. When should the heat shrink be installed on the fiber?

Before stripping the plastic coating from the fiber.

If the telephone wiring is in the bus topology and the twisted-pair cable tester is connected at the embedded multimedia terminal adapter (EMTA) with the remote unit connected to the last outlet in the loop, what is the quickest way to locate the incorrectly wired outlet if the tester indicates a wiring error?

Break the loop into smaller sections and retest the two sections to identify which one has the wiring error. Continue to divide the section with the error into smaller sections until the wiring error is identified.

How would you use a laptop computer, tablet, or cell phone when performing a site survey for a wireless local area network (WLAN)?

By checking for signal strength and coverage areas while roaming around the facility.

How can filtering augment some of the security limitations of Wired Equivalent Privacy (WEP) in a wireless local area network (WLAN)?

By defining parameters to which client stations must adhere in order to gain access to the network.

What is one reason why broadband cable operators install fiber-optic cable in stages instead of changing the infrastructure all at once?

Changing the infrastructure all at once would cause too many service disruptions

Which term describes a wireless system in which the access point (AP) removes the wireless local area network's (WLAN) service set identifier (SSID) from the beacon frames?

Closed system.

In a Data Over Cable Service Interface Specification (DOCSIS) network, why is the data throughput over the return or upstream path typically less than the throughput of data over the forward or downstream path?

Compared to the downstream path, the narrower bandwidths and lower orders of modulation used to transport data over the return path cause the downstream and upstream data throughput to be unequal or asymmetrical.

For maximum security, you should base your wireless local area network (WLAN) user authentication on which one of the following?

Device-independent schemes, such as user names and passwords.

Although there are many different implementations of spread spectrum technology, what are the only types specified by the Federal Communications Commission (FCC) in the Codes of Federal Regulation (CFR), Volume 47, Part 15?

Direct Sequencing Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).

What challenges do Wireless Internet Service Providers (WISP) have to overcome in order to provide "last mile data delivery" to customers?

Distance to access points (AP), rooftop access, lightning, trees, mountains, tower access, and other physical obstacles to connectivity.

Which type of star topology used in a passive optical network (PON) places the PON splitters into fiber access terminal (FAT) located deep in the network and closer to the customer premises than the centralized split?

Distributed star

How might a wireless local area network (WLAN) administrator ensure compliance with security audits?

Document audit procedures in the security policy.

In what direction does an omnidirectional antenna radiate radio frequency (RF) energy?

Equally in all directions around its axis.

Residential gateways have been around for quite some time, but what capability was added to connect to Institute of Electrical and Electronics Engineers (IEEE) 802.11b-, 802.11g-, 802.11n-, and 802.11ac-compliant devices?

Ethernet switching. A Dynamic Host Configuration Protocol (DHCP) server and client. Wireless capability. Network address translation.

What specific problem does a wireless local area network (WLAN) resolve for corporations and home users?

Excessive data cabling.

Bluetooth uses which spread spectrum technology?

Frequency-hopping spread spectrum (FHSS).

In unshielded twisted-pair (UTP) cable, what is the term that describes when an information-carrying conductor makes contact with a grounded conductor?

Ground fault.

Bluetooth is a short range wireless personal area network (WPAN) technology that is covered under which Institute of Electrical and Electronics Engineers (IEEE) standard?

IEEE 802.15

How does Internet protocol (IP) multicast differ from IP broadcast?

IP multicast traffic is only sent to specific modem addresses on the network; IP broadcast traffic is sent to all modems on the network

What information should be gathered during the wireless local area network (WLAN) site survey in a convention center for an upcoming trade show?

Identify who will be installing access points (AP) in ceilings that could are 40 feet high.

What is a consideration when mounting a high-gain omnidirectional antenna indoors on the ceiling?

If the ceiling is too high, the coverage area might not reach the floor where the users are located.

What can be done to increase the coverage area of a wireless local area network (WLAN)?

Increase the transmission power, replace the omnidirectional antenna with a parabolic antenna, and use the 2.4 gigahertz (GHz) radio band instead of the 5 GHz radio band.

You wish to build a wireless network that provides significantly better throughput than a single Institute of Electrical and Electronic Engineers (IEEE) 802.11b access point (AP). Which of the following is an acceptable solution?

Install two load-balanced IEEE 802.11b access points (AP) in the area that operate on the same channel. Use IEEE 802.11-compliant equipment operating in the 5 gigahertz (GHz) Unlicensed National Information Infrastructure (U-NII) bands, allowing for more more non-overlapping channels. Install two IEEE 802.11b radio cards in a single access point (AP), transmitting on Channels 1 and 11. Co-locate IEEE 802.11 frequency hop spread spectrum (FHSS) and 802.11 direct sequence spread spectrum (DSSS) access points (AP) in the same area.

What happens when an active Ethernet switch fails to sense a power over Ethernet (PoE) device on a port?

It switches off the DC voltage on that port.

Why is direct sequence spread spectrum (DSSS) the most widely known and the most used of the spread spectrum types?

Its ease of implementation and high data rates.

What are some of the access points (AP) facts that should be detailed in a wireless local area network (WLAN) site survey?

Location within facility, antenna type to be used, power output settings, how power will be provided to unit, and the expected data throughput per unit

A customer reports a problem of no dial tone (NDT). Upon inspection, the technician notices that new carpeting has been installed. What should the technician do next?

Look for a cable that runs under the carpet; it is likely that the cable has a short from the carpeting tack strip.

What technologies does the Institute of Electrical and Electronics Engineers (IEEE) 802.11n wireless standard use to achieve data rates as high as 600 megabits per second (Mbps)?

Multiple input, multiple output (MIMO) technology and spatial multiplexing.

Which one of the following conditions occurs when an access point (AP) receives a distant client's signal at a lower power level than that of a nearer client?

Near/Far.

What are two features that were added in Data Over Cable Service Interface Specification (DOCSIS) 3.1 to extend the viability of hybrid fiber/coax (HFC) networks into the next decade?

Orthogonal frequency division multiplexing (OFDM) and low-density parity-check (LDPC)

What modulation technique does Institute of Electrical and Electronics Engineers (IEEE) wireless local area network (WLAN) standards 802.11a, 802.11n, and 802.11ac use to achieve higher data throughput?

Orthogonal frequency division multiplexing (OFDM).

What type of connectivity is needed to connect networks between two buildings located across the street from each other?

Point-to-point (P2P).

What basis does a wireless local area networks (WLAN) use an Institute of Electrical and Electronics Engineers (IEEE) 802.1x protocol to control network access?

Port-based network access control (PNAC).

Which one of the following power management modes populates a traffic indication map (TIM) in a basic service set (BSS) or extended service set (ESS)?

Power save polling (PSP) mode.

The ratio of the chipping code to data bits for a direct sequence spread spectrum (DSSS) signal is called which of the following?

Processing gain.

How does radio frequency line-of-sight (RF LOS) differ from visual LOS?

RF LOS is accompanied by a Fresnel zone, a series of concentric ellipsoid-shaped areas around the visual LOS path.

What is it about radio frequency over glass (RFoG) that made broadband cable operators envision using it to make a seamless transition from the legacy hybrid fiber/coax (HFC) architecture over to a gigabit-capable passive optical network (GPON) or Ethernet passive optical network (EPON)?

RFoG can operate in parallel with GPON or EPON, which eliminates the need for any downtime during the transition

How is silver satin cable used to connect telephone equipment to wall outlets typically pinned?

Reversed at opposite ends, or cross-pinned.

Which one of the following tasks is the best choice for troubleshooting the near/far problem?

Review the location of the stations (clients) on the network.

What are some requirements of a wireless local area network (WLAN) in a hospital that make it an effective training ground for individuals who want to immerse themselves in WLAN technology?

Roaming across large distances, a limited number of users on an access point (AP) due to mandated security, and medical applications that are often connection-oriented between the client and server.

You are designing a wireless network to which several functional workgroups are connected. You want to configure your enterprise wireless gateway to allow you to quickly assign identical network access rights to persons within the same workgroup. Which enterprise wireless gateway feature provides this capability?

Role-Based Access Control (RBAC).

What is the tradeoff between the fragmenting of packets into shorter fragments versus keeping longer packet fragments?

Shorter packet fragments have lower probability of errors from interference than longer packet fragments, but shorter packet fragments require more error correction.

Why is spread spectrum technology used in applications such as Bluetooth wireless personal area networks (WPAN)?

Spread spectrum technology allows wireless networking to create a short range, personal communications network.

When connecting to a wireless local area network (WLAN), what is the most important fact about the service set identifier (SSID)?

That the clients and all access points (AP) must be configured with matching SSIDs.

In which Open Systems Interconnection (OSI) reference model layer do wireless local area networks (WLAN) operate?

The Data Link Layer.

Which organization regulates the use of wireless local area network (WLAN) devices in the United States?

The Federal Communications Commission (FCC).

Why is the Fresnel zone important to the integrity of the radio frequency (RF) link or path?

The Fresnel zone defines an area around the RF line-of-sight (RF LOS) that can introduce RF signal interference if blocked.

As a subscriber enters a hotspot area, what signals their mobile wireless device of an available Wi-Fi network?

The access point (AP) advertises to the wireless device to enable connection.

How does a client locate a wireless local area network (WLAN) when performing passive scanning?

The client listens for beacons until it hears a beacon listing the service set identifier (SSID) of the network it expects to join.

Why is it suggested that all data collected as part of a site survey for a wireless local area network (WLAN) be included in the survey report as an attachment, appendix, or separate set of documentation?

The data could be needed in the future.

Why should a wireless network administrator consider installing an enterprise wireless gateway in their network?

The enterprise wireless gateway enables the wireless network administrator to manage a large wireless network using only a few central devices instead of a very large number of access points.

Which component of frequency hopping spread spectrum (FHSS) system creates more overhead than any similar component in a direct sequence spread spectrum (DSSS) system?

The interframe spacing.

What was introduced in Data Over Cable Service Interface Specification (DOCSIS) 3.0 to allow enough bandwidth for upstream carriers from previous DOCSIS versions?

The option to increase the top frequency of the upstream to 85 MHz

Polarization is defined as which one of the following?

The orientation of an electromagnetic wave's electric field in relationship to the Earth's surface or plane.

What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B?

The placement of pair numbers 3 and 4.

What is Equivalent Isotropically Radiated Power (EIRP)?

The power actually radiated by the antenna element.

In a frequency-hopping spread spectrum (FHSS) system that uses 10 frequencies across a 12 megahertz (MHz) frequency band, what happens if narrowband interference occurs at only one of the 10 frequencies?

The spread spectrum signal remains intact. Instead of being lost, the data on the interfered frequency is retransmitted on one of the other nine frequencies.

In the customer premises, what could cause some dual tone multifrequency (DTMF) touch-tone telephones to have continuous dial tone caused by polarity reversal, but not other DTMF telephones?

The telephone wiring polarity is incorrect, and the customer has a mix of older and newer DTMF touch-tone telephones.

What are some measures that can be taken to prevent high voltage standing wave ratios (VSWR) in transmitters and receivers?

Tighten connections between cables and connectors and use impedance-matched hardware throughout.

Which of the following statements is true concerning Bluetooth technology?

To Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks operating in the 2.4 Industrial, Scientific, and Medical (ISM) radio bands, Bluetooth transmissions appear as all-band noise.

What is the purpose of the Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN) superframe?

To allow fair coexistence between point coordination function (PCF)-mode and distributed coordination function (DCF)-mode clients on the network.

What does the "on with threshold" setting of the Request to send/clear to send (RTS/CTS) protocol allow the wireless local area network (WLAN) administrator to control?

To control which frames over a certain size are announced and cleared to send by the stations.

Why are wireless local area networks (WLAN) usually deployed in an access capacity instead of as the network's core layer?

WLANs are generally incapable of meeting the requirements of the network core layer, which needs to be very fast and stable, able to handle a tremendous amount of traffic with little difficulty, and must experience no down time.

What causes the hidden node problem in a wireless local area network (WLAN)?

When a client (or node) can receive signals from an access point (AP) but an obstacle prevents the client from receiving signals from the other clients that are connected to the network.

When should you consider enabling Request to send/clear to send (RTS/CTS) protocol on a wireless local area network (WLAN)?

When diagnosing network problems and when large frames experience high collision rates across a congested wireless network.

Which statement best describes a network application for which a wireless workgroup bridge is the best suited?

When remote buildings house small groups of wired clients needing wireless access to the main network.


संबंधित स्टडी सेट्स

Managerial accounting chapter 22

View Set

California Child Abuse Mandated Reporting

View Set

Skills Lesson: Using and Citing Evidence

View Set

Essentials of Economics (Practice Quiz Ch. 1)

View Set

research method exam 2 chapter 8,9,13,14 15,16

View Set

Fundamentals - Safety, Security, and Emergency Preparedness

View Set